Jane Devry
21
Mar
2025

AI-Driven Attacks Are Exploiting APIs—Here’s What Security Leaders Must Do

AI has reached an inflection point. It’s no longer just a business enabler—it’s redefining the attack surface. As organizations deploy…

Albabat Ransomware Targets Windows, Linux, and macOS via GitHub Abuse
21
Mar
2025

Albabat Ransomware Targets Windows, Linux, and macOS via GitHub Abuse

Recent research by Trend Micro has uncovered a significant evolution in the Albabat ransomware, which now targets not only Windows…

Jane Devry
21
Mar
2025

GitHub Supply Chain Attack Raises Awareness Across The Cybersecurity Community

The recent GitHub software supply chain attack has exposed up to 23,000 repositories, which now has CISA sounding the alarm….

53% of security teams lack continuous and up-to-date visibility
21
Mar
2025

53% of security teams lack continuous and up-to-date visibility

Enterprises lack visibility into their own data, creating security risks that are compounding as organizations and their employees increase AI…

Coinbase originally targeted during GitHub Action supply chain attack
21
Mar
2025

Coinbase originally targeted during GitHub Action supply chain attack

Dive Brief:  The threat actors in the GitHub Action supply chain attack were targeting Coinbase as part of their initial…

Tornado Cash
21
Mar
2025

US removes sanctions against Tornado Cash crypto mixer

The U.S. Department of Treasury announced today that it has removed sanctions against Tornado Cash, a cryptocurrency mixer used by North…

Medusa ransomware using malicious driver as EDR killer
21
Mar
2025

Medusa ransomware using malicious driver as EDR killer

A Medusa ransomware campaign is using a malicious driver to disrupt and even delete endpoint detection and response (EDR) products…

Jane Devry
21
Mar
2025

Learn Malware Analysis with This Hands-on Course

While cyber threats evolve at an unprecedented pace, equipping the next generation of cybersecurity professionals with practical, hands-on skills is…

UAT-5918 Targets Taiwan's Critical Infrastructure Using Web Shells and Open-Source Tools
21
Mar
2025

UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools

Mar 21, 2025Ravie LakshmananThreat Hunting / Vulnerability Threat hunters have uncovered a new threat actor named UAT-5918 that has been…

Dutch workforce faces radical transformation as AI adoption accelerates
21
Mar
2025

Dutch workforce faces radical transformation as AI adoption accelerates

While the Netherlands leads Europe in AI adoption, with 95% of organisations running AI programmes, labour market experts warn that…

Jane Devry
21
Mar
2025

Examining the State of IGA

Today’s organizations face a rapidly multiplying number of digital identities as hybrid work and cloud, SaaS, IIoT, and other technologies…

Veeam RCE Vulnerability Allows Domain Users to Hack Backup Servers
21
Mar
2025

Veeam RCE Vulnerability Allows Domain Users to Hack Backup Servers

Researchers uncovered critical Remote Code Execution (RCE) vulnerabilities in the Veeam Backup & Replication solution. These vulnerabilities, which include CVE-2025-23120,…